SVG's <code><use></code> element could have been used to load unexpected content that could have executed script in certain circumstances. While the specification seems to allow this, other browsers do not, and web developers relied on this property for script security so gecko's implementation was aligned with theirs. This vulnerability affects Firefox < 99.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-13/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1754522 | issue tracking permissions required vendor advisory |